Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 25 January 2010

Windows XP with SP2: A First Look at Today’s Networking Infrastructure

Posted on 11:39 by Unknown
Windows XP is fondly remembered today, but in fact the initially shipped version of that operating system was probably the most insecure product Microsoft has ever shipped.
That wasn’t obvious at the time, of course, but during the first year of XP’s release, hackers launched an unprecedented number of electronic attacks on the system, causing Microsoft to halt new OS development for about nine months so that it could devise its Trustworthy Computing initiative and apply the security principles it learned during this process to its products. The first product to ship after this period was Windows XP Service Pack 2 (SP2), which included a number of security technologies that Microsoft had originally intended to ship first in its next OS, now called Windows 7.

Before moving on to what’s changed since then, we will look at the security technologies
Microsoft introduced in XP SP2 to see how they compare to their Windows 7 counterparts. When you think about it, many OS security features are directly related to networking because the most common way for hackers to attack a PC is electronically, over the network; and with pervasive broadband Internet connections becoming increasingly common, understanding these technologies is critical for anyone using a Windows PC today:

• Automatic Updating: Beginning with Windows XP with SP2, Windows users received a full-screen advertisement for Automatic Updating, the Windows Update–based service that automatically keeps your Windows PC up-to-date with the latest critical security updates. Microsoft also began using subfile patch-management technologies, keeping the download sizes to a minimum and speeding updates.

• Windows Firewall: While the originally shipped version of Windows XP did in fact ship with firewall software, it was disabled by default and most Windows software was written with the assumption that no firewall existed. Because firewalls are designed to control the network traffic coming into and going out of your PC, this type of software is key to preventing unwanted software—such as viruses and other malware—from performing dangerous actions and potentially enabling a hacker to remotely control the PC.

• Windows Security Center: In XP SP2, this dashboard monitors the state of the firewall, antivirus, and automatic updating functionality installed on the computer and ensures that they’re running and up-to-date. (The Windows Vista version was improved to monitor other security features, including antispyware, User Account Control, and Internet Explorer 7’s anti-phishing feature, among others.) In Windows 7, this functionality has been expanded yet again to include system maintenance and other monitoring. As a result, the feature has been renamed Action Center.

• Internet Explorer: IE6 was dramatically improved in SP2 with a new pop-up blocker, protection against so-called “drive-by” downloads, a new Manage Addons applet, and other security-oriented features. Manage Add-ons was significantly enhanced in IE7 and Windows Vista, and of course IE8 adds even more security controls.

• Attachment blocking: Both Outlook Express (e‑mail) and Windows Messenger (instant messaging) were upgraded with blocking functionality for unsafe attachments in XP SP2. Today, both products have been upgraded significantly and moved into the Windows Live initiative, with Windows Live Mail and Windows Live Messenger, respectively.

• Wireless networking: In the originally shipped version of Windows XP, wireless networking configuration was almost nonexistent. If there was a wireless network nearby, the system would simply connect to it, security be damned. Microsoft changed this behavior slightly in Service Pack 1, adding a block that prevented automatic connections to insecure networks. In SP2, Microsoft applied several changes that were later included in Vista as well, including a new Wireless Connection application and a simple Wireless Network Setup Wizard. Things are even simpler in Windows 7, as you’ll soon see.

Put simply, Windows XP Service Pack 2 was a tough upgrade because the security improvements broke a lot of existing applications, causing headaches for users, IT administrators, and application developers at the time. However, these security changes were necessary and have made the transition to Windows Vista and Windows 7 that much easier.

Source of Information : Wiley Windows 7 Secrets (2009)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows XP | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ▼  January (33)
      • Windows 7 - If the Printer Isn’t Found
      • Windows 7 - Installing a Local Printer
      • Windows 7 - Installing and Configuring a Printer
      • Windows 7 Printing Primer
      • Windows 7 Network Locations
      • What’s New in Windows 7 Networking
      • Windows XP with SP2: A First Look at Today’s Netwo...
      • Windows 7 UAC
      • How UAC Has Changed in Windows 7
      • How UAC Works
      • User Account Control
      • Understanding User Accounts
      • Internet Explorer 8 Security Features
      • Windows 7 - Action Center
      • Securing Windows 7 in Just Two Steps
      • Windows Security
      • Windows 7 - 32-bit vs 64-bit versions
      • Improving Windows 7’s Memory
      • Windows 7 Appearance and Performance Tweaking
      • Using Windows 7’s Performance Options
      • Windows 7 - Fine-Tuning Data Execution Prevention
      • Windows 7 - Improving Your Windows Experience Inde...
      • Windows 7 - Understanding Your Windows Experience ...
      • Windows 7 - Getting Your Windows Experience Index ...
      • Windows 7 - Advanced Printer Management
      • Windows 7 - Using the System Configuration Tool to...
      • Windows 7 - Printing Offline
      • Windows 7 - Starting Application Programs Automati...
      • Windows 7 - Understanding Automatic Updates
      • Windows 7 - Making It Boot Faster
      • Virtual Folders—A Short History Lesson
      • Windwos 7 - Virtual Folders 101
      • Windows 7 Changing Search and Indexing Settings
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile